Sciweavers

570 search results - page 64 / 114
» Black-box constructions for secure computation
Sort
View
ICCSA
2005
Springer
14 years 1 months ago
Perturbed Hidden Matrix Cryptosystems
Abstract. We apply internal perturbation [3] to the matrix-type cryptosystems [Cn] and HM constructed in [9]. Using small instances of these variants, we investigate the existence ...
Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng ...
ICDCSW
2003
IEEE
14 years 1 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
CCS
2005
ACM
14 years 1 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
CCS
2007
ACM
14 years 2 months ago
Privacy-preserving remote diagnostics
We present an efficient protocol for privacy-preserving evaluation of diagnostic programs, represented as binary decision trees or branching programs. The protocol applies a bran...
Justin Brickell, Donald E. Porter, Vitaly Shmatiko...
ESORICS
2007
Springer
14 years 2 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...